Search results for "424"
showing 10 items of 86 documents
¿Cómo afecta la innovación en la satisfacción y la lealtad hacia el establecimiento minorista?
2021
Resumen En el presente estudio, se examinó el concepto de innovación en el sector minorista y se definieron sus relaciones con otras variables, como la satisfacción y la lealtad, tradicionalmente vinculadas con el establecimiento minorista. Para lograr los objetivos planteados, se delimitó un modelo teórico sustentado en la literatura, que se contrastó mediante un estudio empírico utilizando un cuestionario estructurado ad hoc aplicado a una muestra de 510 clientes de establecimientos de alimentación. El análisis de los datos se desarrolló mediante la técnica de regresión por mínimos cuadrados parciales. Los resultados permiten proponer un conjunto de recomendaciones para la gestión, fundam…
Dlk1 dosage regulates hippocampal neurogenesis and cognition
2021
Significance Generation of new neurons occurs normally in the adult brain in two locations: the subventricular zone (SVZ) in the walls of the lateral ventricles and the subgranular zone (SGZ) in the dentate gyrus (DG) of the hippocampus. Neurogenesis in the adult hippocampus has been implicated in cognitive functions such as learning, memory, and recovery of stress response. Imprinted genes are highly prevalent in the brain and have adult and developmental important functions. Genetic deletion of the imprinted gene Dlk1 from either parental allele shows that DLK1 is a key mediator of quiescence in adult hippocampal NSCs. Additionally, Dlk1 is exquisitely dosage sensitive in the brain with p…
Vēsture: Latvijas Universitātes Žurnāls, Nr.11/12
2021
Separation of presynaptic Cav2 and Cav1 channel function in synaptic vesicle exo- and endocytosis by the membrane anchored Ca2+ pump PMCA
2021
Significance Synaptic vesicle (SV) release from presynaptic terminals requires nanometer precise control of action potential (AP)–triggered calcium influx through voltage-gated calcium channels (VGCCs). SV recycling also depends on calcium signals, though in different spatiotemporal domains. Mechanisms for separate control of SV release and recycling by AP-triggered calcium influx remain elusive. Here, we demonstrate largely independent regulation of release and recycling by two different populations of VGCCs (Cav2, Cav1), identify Cav1 as one of potentially multiple calcium entry routes for endocytosis regulation, and show functional separation of simultaneous calcium signals in the nanome…
SCADA Intrusion Detection System Test Framework
2017
Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This master thesis presents a SCADA Intrusion Detection System Test Framework that can be used to simulate SCADA traffic and detect malicious network activity. The framework uses a signature-based approach and utilize two different IDS engines, Suricata and Snort. The IDS engines include rule-sets for the IEC 60870-5-104, DNP3 and Modbus protocols. The IDS engines ships detected events to a di…
SIP based IP-telephony network security analysis
2004
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad This thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is performed from the perspective of an attacker trying to find weaknesses in the network. For each type of attempt by the malicious attacker, we examined the security level and possible solutions to flaws in the system. The conclusion of this analysis is that the VoIP service is exploitable, and that serious improvements are needed to achieve a satisfying level of security for the system.
Security in GPRS
2001
Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, Grimstad GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents from a company’s Intranet to an employee. It is important to have strong focus on the security, so companies and persons that demand high level of security can take advantage of the services GPRS offered. What normally happens is that the services wins against the security. This is in most cases adequate security for what a normal subscriber requires. This thesis covers which securit…
Gateway security between Bluetooth and GSM/GPRS
2002
Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The amount of wireless technologies is getting bigger and wider. It is more and more common in everyday use for a huge amount of the people. A cellular phone is something that everyone got in addition to normal access the Internet. So, why not both at the same time. When data is transmitted over the Internet and are communicating with wireless technologies, there are several vulnerable points. There have to be secure data communication, and the security is only something that should lay behind which people do not have to think about. Unfortunately, this is not the way it is, there are different techn…
Personal firewall in mobile phone
2004
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad The assignment described in this master thesis is given by Ericsson AS and gives an evaluation of a need for a personal firewall in mobile phone. In today’s commercial products personal firewall in mobile phone does not exist. This master thesis analyzes the role of personal firewall in different scenarios. At the beginning of the master thesis functions that already exist in personal firewall for PC were discussed in the sense of which could be useful in personal firewall for mobile phone. This master thesis also covers description of connection between personal firewall and virus in addition to wha…
Formation of secure wireless ad-hoc sensor networks
2004
Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad Looking into the wireless world today, the most of data/information is transmitted in plaintext over the ether. These sensitive data/information possibly route through several intermediate nodes to a destination. To secure the sensitive data/information, the various ad-hoc technologies like Bluetooth, WLAN and ZigBee have implemented different security mechanisms and routing protocols. But since most wireless ad-hoc networks demand battery driven devices they will have limit resources to provide feasible security. The different technologies will be outlined regarding a set case scenario. We have a pa…